文献データベース

Cognitive Triaging of Phishing Attacks

Authors: Amber van der Heijden, Luca Allodi | Published: 2019-05-06 | Updated: 2019-05-29
データ収集手法
ポイズニング
攻撃シナリオ分析

Privacy-Preserving Deep Neural Networks with Pixel-based Image Encryption Considering Data Augmentation in the Encrypted Domain

Authors: Warit Sirichotedumrong, Takahiro Maekawa, Yuma Kinoshita, Hitoshi Kiya | Published: 2019-05-06
プライバシー手法
暗号化ドメインでのデータ拡張
機械学習のプライバシー保護

Better the Devil you Know: An Analysis of Evasion Attacks using Out-of-Distribution Adversarial Examples

Authors: Vikash Sehwag, Arjun Nitin Bhagoji, Liwei Song, Chawin Sitawarin, Daniel Cullina, Mung Chiang, Prateek Mittal | Published: 2019-05-05
ポイズニング
敵対的サンプル
敵対的攻撃検出

CharBot: A Simple and Effective Method for Evading DGA Classifiers

Authors: Jonathan Peck, Claire Nie, Raaghavi Sivaguru, Charles Grumer, Femi Olumofin, Bin Yu, Anderson Nascimento, Martine De Cock | Published: 2019-05-03 | Updated: 2019-05-30
マルウェア検出
敵対的攻撃検出
機械学習

Locally Differentially Private Naive Bayes Classification

Authors: Emre Yilmaz, Mohammad Al-Rubaie, J. Morris Chang | Published: 2019-05-03
プライバシー手法
機械学習
次元削減手法

Transfer of Adversarial Robustness Between Perturbation Types

Authors: Daniel Kang, Yi Sun, Tom Brown, Dan Hendrycks, Jacob Steinhardt | Published: 2019-05-03
敵対的サンプル
敵対的攻撃検出
適応型敵対的訓練

Generative Adversarial Network for Wireless Signal Spoofing

Authors: Yi Shi, Kemal Davaslioglu, Yalin E. Sagduyu | Published: 2019-05-03 | Updated: 2019-05-07
攻撃シナリオ分析
機械学習
物理層セキュリティ

Mimic Learning to Generate a Shareable Network Intrusion Detection Model

Authors: Ahmed Shafee, Mohamed Baza, Douglas A. Talbert, Mostafa M. Fouda, Mahmoud Nabil, Mohamed Mahmoud | Published: 2019-05-02 | Updated: 2020-02-18
ポイズニング
モデル設計
機械学習

You Only Propagate Once: Accelerating Adversarial Training via Maximal Principle

Authors: Dinghuai Zhang, Tianyuan Zhang, Yiping Lu, Zhanxing Zhu, Bin Dong | Published: 2019-05-02 | Updated: 2019-11-01
最適化アルゴリズムの選択と評価
機械学習
適応型敵対的訓練

Weight Map Layer for Noise and Adversarial Attack Robustness

Authors: Mohammed Amer, Tomás Maul | Published: 2019-05-02 | Updated: 2020-12-02
ロバスト推定
将来の研究
敵対的攻撃手法